1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lerok [7]
2 years ago
11

Sampson runs his own online business, and much of his success depends on the reliability and accuracy of various online data. Ho

w does integrity help to ensure that Sampson can trust the online data he is using?
A.
Integrity takes steps to ensure Sampson's information cannot be altered or deleted by unauthorized people.

B.
Integrity refers to a process that makes it impossible for anyone but Sampson to see the data that he is using.

C.
Integrity blocks all hackers from interfering with Sampson's data and what he does with it.

D.
Integrity allows Sampson to access and move data on an unsecured network.
Computers and Technology
1 answer:
Elena-2011 [213]2 years ago
6 0

Answer: because integrity takes steps to ensure Sampson's information cannot be altered or deleted by unauthorized people and that it stays intact, no matter where it goes

Explanation:

You might be interested in
This type of connection is best to use when downloading large files on a network.
Elina [12.6K]
Ethernet is best to use when you have to download large files on a network.
8 0
3 years ago
Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines
Sever21 [200]
The correct answer is letter D, determine how applying information systems will increase her business opportunities. 

This is the smartest and the best step that she can take in order for her to increase her profits from her business. When here profits have increased, it is already easy to figure out the next steps on how she can expand her company. 
5 0
2 years ago
What is used for risk response control?
miskamm [114]

Answer:

Risk response control uses methods such as mitigate, avoidance, shift, actively accept, and passively accept.

Explanation:

Risk Response Control refers to the procedure of evaluating residual risks, detecting new risks, guaranteeing the execution of risk plans, and assessing the success of the plans in decreasing risk is known as risk response control. Whereby the risk response control techniques include acceptance, avoidance, transfer, and mitigation

6 0
1 year ago
What method of malware infection installs malware through use of a separate browser window that opens uninvited from a Web page?
IgorC [24]

Answer:

Pop-up download

Explanation:

A pop-up download occurs when a user is on a web page and a pop-up window shows that asks the user to download a program to their computer, It is mostly used to install malware that monitors the user online behavior and reports back to the spyware company.

7 0
3 years ago
Read 2 more answers
1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
NeX [460]

Answer:

helthcare systems, aviation, entertainment, retail, etc

Explanation:

ICT has made life easy, it has made an interconection accross the world. in the helthcare system, ICT has created a positive impact because now a days body check up is been made through computers.

in the aviation, we use computers to control the the traffic of airplanes.

5 0
2 years ago
Other questions:
  • A software program that enables users to find and display information stored as html pages on the internet is a(n) ____.
    5·1 answer
  • Plz answer and dont put a random thing for the points
    11·1 answer
  • Type the correct answer in the box. Spell the word correctly. What aspect should you consider before adding pictures to a docume
    7·2 answers
  • Integrated circuits are made up of _____ and carry an electrical current
    14·1 answer
  • type of weapon of mass decruction taht spreads deadly radioactive material by way of conventinal explosion
    15·1 answer
  • What is the name of the program file that you can enter in the Windows search or Run box to execute Event Viewer? What process i
    12·1 answer
  • Which type of CPU instruction performs arithmetic calculations and stores the results in memory?
    14·2 answers
  • I nees the meaning of these words even just one of them would help out ( pixel megapixel colour depth bit and byte)
    15·2 answers
  • The cause of french revolution and anayze the reason for significane out come
    6·1 answer
  • Why would a user want to resend a message? Check all that apply.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!